Gungnir & Nebula Services

Protecting What Matters — Homes & Businesses Alike

Windows Security Optimization

For Home Users and Families

We make your Windows computers safer by adding strong protections that are not included by default. Think of it as locking all the doors and windows on your digital house—so you and your family stay secure while online.

For Businesses and Professionals

Strengthen your company’s cybersecurity with advanced Windows configuration, policy management, attack surface reduction, and proactive defense setups—tailored to your business needs and industry standards.

Email for pricing

Managed IT Support

For Home Users and Families

We help keep your computers, devices, and networks running smoothly with expert updates, troubleshooting, and security checks—so you can focus on what matters most without worrying about technology problems.

For Businesses and Professionals

Ensure your business stays operational and protected with proactive monitoring, system updates, cybersecurity maintenance, and quick issue resolution tailored to your organization's unique needs.

Email for pricing

Network Security & Setup

For Home Users and Families

Protect your smart devices (IoT) like cameras, TVs, and thermostats by keeping them separated from your main devices. We'll configure your home router to make your family’s internet safer and more private.

For Businesses and Professionals

Keep customer traffic and sensitive business systems isolated through professional VLAN network design and configuration. Maintain security, compliance, and performance—while offering safe Wi-Fi access for guests and customers.

Email for pricing

About Me

Global Industrial Cyber Security Professional (GICSP)

Bridging IT, engineering, and cybersecurity to protect critical infrastructure.
Verify: GICSP Credential

GIAC Penetration Tester (GPEN)

Proficient in penetration testing methodologies, exploits, and ethical assessment.
Verify: GPEN Credential

GIAC Certified Incident Handler (GCIH)

Specialized in incident response, malware analysis, and defensive strategies.
Verify: GCIH Credential

Need a custom security solution? Let's talk!

[email protected]

"echo c3RhZ2UtaW5nIGFuYWx5c2lzIGlzIGtleQo=" | base64 -d